generated from codacy/codacy-public-template
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
66 additions
and
66 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,74 +4,74 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="7" | ||
message="Insecure dependency golang.org/x/[email protected] (CVE-2023-44487: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)) (update to 0.17.0)" | ||
message="Insecure dependency golang/golang.org/x/[email protected] (CVE-2023-44487: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)) (update to 0.17.0)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="7" | ||
message="Insecure dependency golang.org/x/[email protected] (CVE-2023-45288: golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS) (update to 0.23.0)" | ||
message="Insecure dependency golang/golang.org/x/[email protected] (CVE-2023-45288: golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS) (update to 0.23.0)" | ||
severity="warning" | ||
/> | ||
<!-- stdlib --> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2023-39326: golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests) (update to 1.20.12)" | ||
message="Insecure dependency golang/[email protected] (CVE-2023-39326: golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests) (update to 1.20.12)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-24791: net/http: Denial of service due to improper 100-continue handling in net/http) (update to 1.21.12)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-24791: net/http: Denial of service due to improper 100-continue handling in net/http) (update to 1.21.12)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2023-45289: golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect) (update to 1.21.8)" | ||
message="Insecure dependency golang/[email protected] (CVE-2023-45289: golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect) (update to 1.21.8)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2023-45290: golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm) (update to 1.21.8)" | ||
message="Insecure dependency golang/[email protected] (CVE-2023-45290: golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm) (update to 1.21.8)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-24783: golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm) (update to 1.21.8)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-24783: golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm) (update to 1.21.8)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-24784: golang: net/mail: comments in display names are incorrectly handled) (update to 1.21.8)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-24784: golang: net/mail: comments in display names are incorrectly handled) (update to 1.21.8)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-24785: golang: html/template: errors returned from MarshalJSON methods may break template escaping) (update to 1.21.8)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-24785: golang: html/template: errors returned from MarshalJSON methods may break template escaping) (update to 1.21.8)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-24789: golang: archive/zip: Incorrect handling of certain ZIP files) (update to 1.21.11)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-24789: golang: archive/zip: Incorrect handling of certain ZIP files) (update to 1.21.11)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message="Insecure dependency [email protected] (CVE-2024-34155: go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion) (update to 1.22.7)" | ||
message="Insecure dependency golang/[email protected] (CVE-2024-34155: go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion) (update to 1.22.7)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="3" | ||
message='Insecure dependency [email protected] (CVE-2024-34158: go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion) (update to 1.22.7)' | ||
message='Insecure dependency golang/[email protected] (CVE-2024-34158: go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion) (update to 1.22.7)' | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -80,7 +80,7 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="1" | ||
message="Insecure dependency org.apache.logging.log4j:log4j-core:2.17.0 (CVE-2021-44832: log4j-core: remote code execution via JDBC Appender) (update to 2.17.1)" | ||
message="Insecure dependency maven/org.apache.logging.log4j/log4j-core@2.17.0 (CVE-2021-44832: log4j-core: remote code execution via JDBC Appender) (update to 2.17.1)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -89,7 +89,7 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="14" | ||
message="Insecure dependency org.apache.logging.log4j:log4j-core:2.17.0 (CVE-2021-44832: log4j-core: remote code execution via JDBC Appender) (update to 2.17.1)" | ||
message="Insecure dependency maven/org.apache.logging.log4j/log4j-core@2.17.0 (CVE-2021-44832: log4j-core: remote code execution via JDBC Appender) (update to 2.17.1)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -98,13 +98,13 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="14" | ||
message="Insecure dependency [email protected] (CVE-2020-28168: nodejs-axios: allows an attacker to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address) (update to 0.21.1)" | ||
message="Insecure dependency npm/[email protected] (CVE-2020-28168: nodejs-axios: allows an attacker to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address) (update to 0.21.1)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="14" | ||
message="Insecure dependency [email protected] (CVE-2023-45857: axios: exposure of confidential data stored in cookies) (update to 0.28.0)" | ||
message="Insecure dependency npm/[email protected] (CVE-2023-45857: axios: exposure of confidential data stored in cookies) (update to 0.28.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -113,13 +113,13 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="5" | ||
message="Insecure dependency [email protected] (CVE-2020-28168: nodejs-axios: allows an attacker to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address) (update to 0.21.1)" | ||
message="Insecure dependency npm/[email protected] (CVE-2020-28168: nodejs-axios: allows an attacker to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address) (update to 0.21.1)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="5" | ||
message="Insecure dependency [email protected] (CVE-2023-45857: axios: exposure of confidential data stored in cookies) (update to 0.28.0)" | ||
message="Insecure dependency npm/[email protected] (CVE-2023-45857: axios: exposure of confidential data stored in cookies) (update to 0.28.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -128,13 +128,13 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="131" | ||
message="Insecure dependency [email protected] (CVE-2023-32681: python-requests: Unintended leak of Proxy-Authorization header) (update to 2.31.0)" | ||
message="Insecure dependency pypi/[email protected] (CVE-2023-32681: python-requests: Unintended leak of Proxy-Authorization header) (update to 2.31.0)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="131" | ||
message="Insecure dependency [email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)" | ||
message="Insecure dependency pypi/[email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -143,13 +143,13 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="2" | ||
message="Insecure dependency [email protected] (CVE-2023-32681: python-requests: Unintended leak of Proxy-Authorization header) (update to 2.31.0)" | ||
message="Insecure dependency pypi/[email protected] (CVE-2023-32681: python-requests: Unintended leak of Proxy-Authorization header) (update to 2.31.0)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="2" | ||
message="Insecure dependency [email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)" | ||
message="Insecure dependency pypi/[email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -158,19 +158,19 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="4" | ||
message="Insecure dependency [email protected] (CVE-2023-40175: rubygem-puma: HTTP request smuggling when parsing chunked transfer encoding bodies and zero-length content-length headers) (update to ~> 5.6.7, >= 6.3.1)" | ||
message="Insecure dependency gem/[email protected] (CVE-2023-40175: rubygem-puma: HTTP request smuggling when parsing chunked transfer encoding bodies and zero-length content-length headers) (update to ~> 5.6.7, >= 6.3.1)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="4" | ||
message="Insecure dependency [email protected] (CVE-2024-21647: rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies) (update to ~> 5.6.8, >= 6.4.2)" | ||
message="Insecure dependency gem/[email protected] (CVE-2024-21647: rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies) (update to ~> 5.6.8, >= 6.4.2)" | ||
severity="warning" | ||
/> | ||
<error | ||
source="vulnerability_medium" | ||
line="4" | ||
message="Insecure dependency [email protected] (CVE-2024-45614: rubygem-puma: Header normalization allows for client to clobber proxy set headers) (update to ~> 5.6.9, >= 6.4.3)" | ||
message="Insecure dependency gem/[email protected] (CVE-2024-45614: rubygem-puma: Header normalization allows for client to clobber proxy set headers) (update to ~> 5.6.9, >= 6.4.3)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -179,7 +179,7 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="1" | ||
message="Insecure dependency [email protected] (GHSA-xmrp-424f-vfpx: SQLx Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts) (update to 0.8.1)" | ||
message="Insecure dependency cargo/[email protected] (GHSA-xmrp-424f-vfpx: SQLx Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts) (update to 0.8.1)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -188,7 +188,7 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="13" | ||
message="Insecure dependency com.twitter:twitter-server_2.12:20.10.0 (CVE-2020-35774: TwitterServer Cross-site Scripting via /histograms endpoint) (update to 20.12.0)" | ||
message="Insecure dependency maven/com.twitter/twitter-server_2.12@20.10.0 (CVE-2020-35774: TwitterServer Cross-site Scripting via /histograms endpoint) (update to 20.12.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
@@ -197,7 +197,7 @@ | |
<error | ||
source="vulnerability_medium" | ||
line="67" | ||
message="Insecure dependency github.com/apple/[email protected] (CVE-2023-44487: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)) (update to 1.28.0)" | ||
message="Insecure dependency swift/github.com/apple/[email protected] (CVE-2023-44487: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)) (update to 1.28.0)" | ||
severity="warning" | ||
/> | ||
</file> | ||
|
Oops, something went wrong.